咨询与建议

限定检索结果

文献类型

  • 6,069 篇 期刊文献
  • 4,922 篇 会议
  • 5 册 图书

馆藏范围

  • 10,996 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,414 篇 工学
    • 4,522 篇 计算机科学与技术...
    • 3,770 篇 软件工程
    • 1,568 篇 信息与通信工程
    • 863 篇 控制科学与工程
    • 837 篇 电气工程
    • 769 篇 生物工程
    • 753 篇 化学工程与技术
    • 712 篇 电子科学与技术(可...
    • 535 篇 光学工程
    • 521 篇 生物医学工程(可授...
    • 515 篇 机械工程
    • 363 篇 材料科学与工程(可...
    • 348 篇 仪器科学与技术
    • 304 篇 动力工程及工程热...
    • 287 篇 交通运输工程
    • 225 篇 建筑学
    • 216 篇 土木工程
  • 4,259 篇 理学
    • 2,077 篇 数学
    • 1,251 篇 物理学
    • 920 篇 生物学
    • 688 篇 统计学(可授理学、...
    • 595 篇 化学
    • 311 篇 系统科学
  • 1,895 篇 管理学
    • 1,091 篇 管理科学与工程(可...
    • 870 篇 图书情报与档案管...
    • 359 篇 工商管理
  • 515 篇 医学
    • 431 篇 临床医学
    • 304 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 280 篇 法学
    • 233 篇 社会学
  • 228 篇 农学
  • 156 篇 经济学
  • 86 篇 教育学
  • 32 篇 军事学
  • 30 篇 文学
  • 18 篇 艺术学
  • 1 篇 历史学

主题

  • 262 篇 semantics
  • 225 篇 feature extracti...
  • 208 篇 deep learning
  • 163 篇 data mining
  • 137 篇 computational mo...
  • 136 篇 training
  • 122 篇 machine learning
  • 115 篇 convolution
  • 114 篇 knowledge engine...
  • 101 篇 neural networks
  • 98 篇 image segmentati...
  • 97 篇 predictive model...
  • 95 篇 computer science
  • 92 篇 data models
  • 89 篇 object detection
  • 89 篇 reinforcement le...
  • 89 篇 accuracy
  • 87 篇 optimization
  • 86 篇 contrastive lear...
  • 82 篇 laboratories

机构

  • 400 篇 college of compu...
  • 308 篇 university of ch...
  • 262 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 165 篇 school of inform...
  • 158 篇 horia hulubei na...
  • 156 篇 infn sezione di ...
  • 153 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 147 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 125 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 112 篇 warsaw
  • 112 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 115 篇 brundu d.
  • 111 篇 bellee v.
  • 103 篇 bowcock t.j.v.
  • 102 篇 bobulska d.
  • 102 篇 casse g.
  • 101 篇 blake t.
  • 101 篇 borsato m.
  • 100 篇 betancourt c.
  • 100 篇 belin s.
  • 99 篇 afsharnia h.
  • 93 篇 belavin v.
  • 89 篇 bediaga i.
  • 88 篇 cali s.
  • 85 篇 amato s.
  • 81 篇 baryshnikov f.
  • 79 篇 bjørn m.
  • 76 篇 niyato dusit

语言

  • 9,458 篇 英文
  • 1,302 篇 其他
  • 257 篇 中文
  • 6 篇 德文
  • 6 篇 法文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
10996 条 记 录,以下是721-730 订阅
排序:
Joint Covert and Secure Communication for SWIPT Assisted CNOMA Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20406-20419页
作者: Huang, Gaojian Lei, Yuxin Li, Xingwang Khan, Wali Ullah Wang, Gongpu Nallanathan, Arumugam Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China City University of Macau Faculty of Data Science 999078 China Henan Polytechnic University School of Surveying and Land Information Engineering Jiaozuo454003 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454099 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Luxembourg City1855 Luxembourg Beijing Jiaotong University Beijing Key Laboratory of Transportation Data Analysis and Mining School of Computer and Information Technology Beijing100044 China Institute of Internet of Things Wuxi214111 China Queen Mary University of London School of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of
With the rapid advancement of physical-layer security technology, the covert and secure communication has become crucial in safeguarding wireless communication systems. In this paper, we propose a joint covert and sec... 详细信息
来源: 评论
Adaptive Method of Process Flow Parameter Values Setting Based on Remote Sensing Image Metadata
Adaptive Method of Process Flow Parameter Values Setting Bas...
收藏 引用
2022 International Conference on Signal Processing, Computer Networks, and Communications, SPCNC 2022
作者: Zhou, Bing Ge, Jian Kang Zuo, Xianyu Key Laboratory of Analysis and Processing of Big Data Henan Kaifeng475004 China School of Computer and Information Engineering Henan University Henan Kaifeng475004 China
Remote sensing data processing involves many steps. This paper uses process flow to represent these processing steps. This paper combines remote sensing image metadata (RSIM) with case based reasoning (CBR) technology... 详细信息
来源: 评论
Dual decoder UNet with Contrastive learning for Brain Image Registration
Dual decoder UNet with Contrastive learning for Brain Image ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhang, Ying Guo, Shuai Shi, Dantong Xiang, Jinhai Huazhong Agricultural University College of Informatics Wuhan430070 China Agricultural Bioinformatics Key Laboratory of Hubei Province China Key Laboratory of Smart Farming for Agricultural Animals Ministry of Agriculture Hubei Engineering Technology Research Center of Agricultural Big Data Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education Huazhong Agricultural University Wuhan430070 China
The core of the image registration task is to accurately extract and compare the spatial feature information between moving and fixed images. The model must not only be able to capture features inside an image, but al... 详细信息
来源: 评论
Statistical Model on CRAFT
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 698-712页
作者: WANG Caibing GUO Hao YE Dingfeng WANG Ping State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Tianjin Aerospace Zhongwei Data System Technology Co. Ltd.
Many cryptanalytic techniques for symmetric-key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext-ciphertext pairs. For example, ... 详细信息
来源: 评论
Advances in intelligent computing approaches for solving problems related to photonic crystal fibers: Advances in Intelligent..: D. Yang et al.
收藏 引用
Optical and Quantum Electronics 2025年 第1期57卷 1-31页
作者: Yang, Dan Zhao, Yuyu Liu, Hong Li, Yijin Tang, Chang Li, Shijun Lingye, Zhenglin College of Information Science & Engineering Northeastern University Shenyang110819 Thailand National Frontiers Science Center for Industrial Intelligence and Systems Optimization Shenyang110819 China Key Laboratory of Data Analytics and Optimization for Smart Industry Ministry of Education Northeastern University Shenyang110819 Thailand
Photonic crystal fiber (PCF) has shown a promising application in various fields of modern optics due to its excellent transmission characteristics. However, conventional numerical solution methods have limitations su... 详细信息
来源: 评论
Relating brain structure images to personality characteristics using 3D convolution neural network
收藏 引用
CAAI Transactions on Intelligence Technology 2021年 第3期6卷 338-346页
作者: Lixian Cao Yanchun Liang Wei Lv Kaechang Park Yasuhiro Miura Yuki Shinomiya Shinichi Yoshida Zhuhai Laboratory of Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Zhuhai College of Jilin UniversityZhuhaiChina Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education College of Computer Science and TechnologyJilin UniversityChangchunChina School of Information&Research Institute Kochi University of TechnologyKochiJapan
The Keras deep learning framework is employed to study MRI brain data in a preliminary analysis of brain structure using a convolutional neural *** results obtained are matched with the content of personality *** Big ... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and Computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
PathReasoner: Modeling Reasoning Path with Equivalent Extension for Logical Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fangzhi Lin, Qika Zhao, Tianzhe Han, Jiawei Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China
Logical reasoning task has attracted great interest since it was proposed. Faced with such a task, current competitive models, even large language models (e.g., ChatGPT and PaLM 2), still perform badly. Previous promi... 详细信息
来源: 评论
A synchronous encryption scheme for remote sensing images using 3D cross-coupled chaotic maps and fractal cubes in the internet of things
收藏 引用
Optoelectronics Letters 2025年
作者: 于泽 周莹 满振龙 School of Electronic and Information Engineering, Liaoning Technical University Liaoning Key Laboratory of Radio Frequency and Big Data for Intelligent Applications
With the rapid development and wide application of Internet of Things technology, optical equipment is being promoted to collect and store multi-scale remote sensing images, and to apply them in various fields such ...
来源: 评论
A NEW GLOBAL OPTIMIZATION ALGORITHM FOR MIXED-INTEGER QUADRATICALLY CONSTRAINED QUADRATIC FRACTIONAL PROGRAMMING PROBLEM
收藏 引用
Journal of Computational Mathematics 2024年 第3期42卷 784-813页
作者: Bo Zhang Yuelin Gao Xia Liu Xiaoli Huang School of Civil and Hydraulic Engineering School of Mathematics and StatisticsNingxia UniversityYinchuan 750021China School of Mathematics and Information Science North Minzu UniversityYinchuan 750021China Ningxia Province Key Laboratory of Intelligent Information and Data Processing Yinchuan 750021China School of Mathematics and Statistics Ningxia UniversityYinchuan 750021China
The mixed-integer quadratically constrained quadratic fractional programming(MIQCQFP)problem often appears in various fields such as engineering practice,management science and network ***,most of the solutions to suc... 详细信息
来源: 评论